|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2203 occurrences of 764 keywords
|
|
|
Results
Found 3902 publication records. Showing 3902 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai |
Cryptography from Anonymity. |
FOCS |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Martin Schaffer, Peter Schartner |
Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Akiko Orita |
Designing mutual-aid model for RAQ (Rarely Asked Question) in e-Government: Practical use of anonymity. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Melanie Volkamer, Robert Krimmer |
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Traci A. Carte, Laku Chidambaram, Monica J. Garfield, Lindsey Hicks, Cassie Cole |
Group Creativity and Collaborative Technologies: Understanding the Role of Visual Anonymity. |
CRIWG |
2006 |
DBLP DOI BibTeX RDF |
Lab Experiment, Creativity, Diversity |
19 | Hung-Yu Chien |
Secure Access Control Schemes for RFID Systems with Anonymity. |
MDM |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Konrad Stark, Johann Eder, Kurt Zatloukal |
Priority-Based k-Anonymity Accomplished by Weighted Generalisation Structures. |
DaWaK |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Stefan Köpsell, Rolf Wendolsky, Hannes Federrath |
Revocable Anonymity. |
ETRICS |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Sergio Mascetti, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia |
k-Anonymity in Databases with Timestamped Data. |
TIME |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Eun-Jun Yoon, Kee-Young Yoo |
One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity. |
ICCSA (5) |
2006 |
DBLP DOI BibTeX RDF |
Security, Cryptography, Smart card, User authentication, One-time password, Denial-of-Service attacks |
19 | Wen Jin, Rong Ge 0002, Weining Qian |
On Robust and Effective K-Anonymity in Large Databases. |
PAKDD |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Hongxia Jin |
Privacy, traceability, and anonymity for content protection. |
PST |
2006 |
DBLP DOI BibTeX RDF |
anonymous trust, security, privacy, tracing, content protection |
19 | Ye Zhu 0001, Xinwen Fu, Riccardo Bettati |
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks. |
NCA |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Myung-hee Kang, Hwang-Bin Ryou, WoongChul Choi |
Design of Anonymity-Preserving User Authentication and Key Agreement Protocol for Ubiquitous Computing Environments. |
WINE |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai |
Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet. |
ICPADS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Indrakshi Ray, Elisa Bertino, Anna Cinzia Squicciarini, Elena Ferrari |
Anonymity Preserving Techniques in Trust Negotiations. |
Privacy Enhancing Technologies |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Sujing Zhou, Dongdai Lin |
On Anonymity of Group Signatures. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Eun-Jun Yoon, Kee-Young Yoo |
Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
Cryptography, Password, Key establishment, Forward Secrecy |
19 | Adam Wierzbicki, Aneta Zwierko, Zbigniew Kotulski |
Authentication with controlled anonymity in P2P systems. |
PDCAT |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Adam Meyerson, Ryan Williams 0001 |
On the Complexity of Optimal K-Anonymity. (PDF / PS) |
PODS |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Gergely Tóth, Zoltán Hornák |
Measuring Anonymity in a Non-adaptive, Real-Time System. |
Privacy Enhancing Technologies |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Fabien Laguillaumie, Damien Vergnaud |
Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
Privacy of signers identity, Bilinear Diffie-Hellman problems, Exact security, Designated verifier signatures, Tight reduction |
19 | Ronggong Song, Larry Korba |
How to Make E-cash with Non-Repudiation and Anonymity. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | George Danezis, Andrei Serjantov |
Statistical Disclosure or Intersection Attacks on Anonymity Systems. |
Information Hiding |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Dogan Kesdogan, Lexi Pimenidis |
The Hitting Set Attack on Anonymity Protocols. |
Information Hiding |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Aneta Zwierko, Zbigniew Kotulski |
Mobile Agents: Preserving Privacy and Anonymity. |
IMTCI |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Amos Fiat |
Some Issues Regarding Search, Censorship, and Anonymity in Peer to Peer Networks. |
ICALP |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Winson K. Y. Yeung, Song Han 0004 |
Revocable Anonymity of Undeniable Signature Scheme. |
IDEAL |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Claudia Díaz, Stefaan Seys, Joris Claessens, Bart Preneel |
Towards Measuring Anonymity. |
Privacy Enhancing Technologies |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Yong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee |
New Identity Escrow Scheme for Anonymity Authentication. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Richard Clayton 0001, George Danezis, Markus G. Kuhn |
Real World Patterns of Failure in Anonymity Systems. |
Information Hiding |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Elke Franz 0001, Anja Jerichow, Guntram Wicke |
A Payment Scheme for Mixes Providing Anonymity. |
Trends in Distributed Systems for Electronic Commerce |
1998 |
DBLP DOI BibTeX RDF |
mix service, tick payment, anonymous communication, charging, payment protocols |
19 | Lidong Chen, Torben P. Pedersen |
On the Efficiency of Group Signatures Providing Information-Theoretic Anonymity. |
EUROCRYPT |
1995 |
DBLP DOI BibTeX RDF |
|
18 | Benoît Libert, Moti Yung |
Dynamic fully forward-secure group signatures. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
key protection, anonymity, security modeling, group signatures, forward security, key exposure |
18 | Sin-Hwa Kang, Jonathan Gratch |
The effect of avatar realism of virtual humans on self-disclosure in anonymous social interactions. |
CHI Extended Abstracts |
2010 |
DBLP DOI BibTeX RDF |
affective behavior, anticipated future interaction, avatar realism, nonverbal feedback, evaluation, anonymity, virtual humans, self-disclosure, rapport, contingency |
18 | Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 |
Simplified security notions of direct anonymous attestation and a concrete scheme from pairings. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Direct anonymous attestation, User-controlled-anonymity, User-controlled-traceability, Trusted computing, Bilinear maps |
18 | Danfeng Yao, Roberto Tamassia |
Compact and Anonymous Role-Based Authorization Chain. |
ACM Trans. Inf. Syst. Secur. |
2009 |
DBLP DOI BibTeX RDF |
anonymity, Delegation, aggregate signature |
18 | Pravin Shankar, Vinod Ganapathy, Liviu Iftode |
Privately querying location-based services with SybilQuery. |
UbiComp |
2009 |
DBLP DOI BibTeX RDF |
anonymity., vehicular computing, privacy, location-based services |
18 | Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley |
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice. |
CIKM |
2009 |
DBLP DOI BibTeX RDF |
microdata disclosure control, pareto-optimality, k-anonymity |
18 | Toby Xu, Ying Cai |
Feeling-based location privacy protection for location-based services. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
feeling-based privacy model, k-anonymity model, trajectory cloaking, location-based services, location privacy |
18 | Matthew Edman, Paul F. Syverson |
As-awareness in Tor path selection. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
privacy, anonymity, autonomous systems, tor |
18 | Norman Danner, Danny Krizanc, Marc Liberatore |
Detecting Denial of Service Attacks in Tor. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
reliability, Anonymity, denial of service, detection, attack |
18 | Sherman S. M. Chow |
Real Traceable Signatures. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
efficient tracing, anonymity management, group signatures, standard model, bilinear groups, traceable signatures |
18 | Felix Halim, Yongzheng Wu, Roland H. C. Yap |
Wiki credibility enhancement. |
Int. Sym. Wikis |
2009 |
DBLP DOI BibTeX RDF |
anonymity, Wikipedia, credibility, OpenID, login |
18 | Benjamin C. M. Fung, Ming Cao, Bipin C. Desai, Heng Xu |
Privacy protection for RFID data. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
data mining, anonymity, information sharing, privacy protection, sensitive information |
18 | Prasit Bikash Chanda, Vincent Naessens, Bart De Decker |
Anonymous, Yet Trustworthy Auctions. |
I3E |
2009 |
DBLP DOI BibTeX RDF |
Distributed Systems, Trust, Anonymity, Auction, Credential |
18 | Mingwu Zhang, Yusheng Zhong, Bo Yang 0003, Wenzheng Zhang |
Analysis and Improvement of an ID-Based Anonymous Signcryption Model. |
ICIC (1) |
2009 |
DBLP DOI BibTeX RDF |
anonymous signcryption, anonymity, bilinear pairings, unforgeability |
18 | Sin-Hwa Kang, Jonathan Gratch, James H. Watt |
The effect of affective iconic realism on anonymous interactants' self-disclosure. |
CHI Extended Abstracts |
2009 |
DBLP DOI BibTeX RDF |
affective behavior, anticipated future interaction, avatar realism, embodied virtual agents, nonverbal feedback, evaluation, anonymity, virtual humans, social presence, self-disclosure, rapport, contingency |
18 | Shinsaku Kiyomoto, Keith M. Martin, Kazuhide Fukushima |
Privacy-Aware Location Database Service for Granular Queries. |
WISTP |
2009 |
DBLP DOI BibTeX RDF |
Privacy, Location-based services, k-anonymity |
18 | Lucie Langer, Melanie Volkamer, Stefan G. Weber, Axel Schmidt 0001, Johannes Buchmann 0001 |
Towards long-term free and secret electronic elections providing voter-verifiability in the bulletin board model. |
ICEGOV |
2009 |
DBLP DOI BibTeX RDF |
long-term anonymity, electronic voting, security requirements, verifiability |
18 | Yu-Fang Chung, Tzer-Shyong Chen, Yu-Ting Chen, Chiu-Chan Lee, Szu-Wen Wang |
An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
English auction protocol, Mobile agent, anonymity, elliptic curve cryptosystem, public verifiability |
18 | Vishal Saraswat, Aaram Yun |
Anonymous Signatures Revisited. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
anonymous signature, unpreten- dability, anonymity, signature |
18 | Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields |
Passive-Logging Attacks Against Anonymous Communications Systems. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
intersection attack, predecessor attack, privacy, anonymity, anonymous communication |
18 | Shaohui Wang |
Modification and Improvement on Group Signature Scheme without Random Oracles. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Anonymity, Group Signature, Random Oracle Model, Bilinear |
18 | Toru Nakanishi 0001, Nobuo Funabiki |
A short anonymously revocable group signature scheme from decision linear assumption. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
anonymity, group signature, revocation |
18 | Yongquan Cai, Xiuying Li |
Identity-Based Conference Key Distribution Scheme Using Sealed Lock. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
Sealed Lock, Anonymity, Identity-based, Conference Key |
18 | Yang Ye, Qiao Deng, Chi Wang 0001, Dapeng Lv, Yu Liu 0068, Jianhua Feng |
BSGI: An Effective Algorithm towards Stronger l-Diversity. |
DEXA |
2008 |
DBLP DOI BibTeX RDF |
BSGI, Unique-Distinct l-diversity, Privacy preservation, k-anonymity, l-diversity |
18 | Jordi Pont-Tuset, Jordi Nin, Pau Medrano-Gracia, Josep Lluís Larriba-Pey, Victor Muntés-Mulero |
Improving Microaggregation for Complex Record Anonymization. |
MDAI |
2008 |
DBLP DOI BibTeX RDF |
Privacy in Statistical Databases, k-anonymity, Microaggregation |
18 | Kun Liu 0001, Evimaria Terzi |
Towards identity anonymization on graphs. |
SIGMOD Conference |
2008 |
DBLP DOI BibTeX RDF |
degree sequence, dynamic programming, anonymity |
18 | Atsushi Tagami, Chikara Sasaki, Teruyuki Hasegawa, Shigehiro Ano, Yoichi Tomiura |
Optimization of the Answering Method with Probability Conversion. |
SAINT |
2008 |
DBLP DOI BibTeX RDF |
Probability Conversion, Anonymity |
18 | Karsten Loesing, Werner Sandmann, Christian Wilms, Guido Wirtz |
Performance Measurements and Statistics of Tor Hidden Services. |
SAINT |
2008 |
DBLP DOI BibTeX RDF |
Performance, Privacy, Anonymity, Statistical Analysis, Empirical Measurements |
18 | Sin-Hwa Kang, James H. Watt, Sasi Kanth Ala |
Social copresence in anonymous social interactions using a mobile video telephone. |
CHI |
2008 |
DBLP DOI BibTeX RDF |
affective behavior, avatar realism, mobile phone communication, social copresence, anonymity, social presence |
18 | Mehmet Ercan Nergiz, Maurizio Atzori, Yücel Saygin |
Towards trajectory anonymization: a generalization-based approach. |
SPRINGL |
2008 |
DBLP DOI BibTeX RDF |
privacy, k-anonymity, spatio temporal |
18 | Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski |
Distributed Verification of Mixing - Local Forking Proofs Model. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
distributed system, anonymity, mix |
18 | Kwangsu Lee, Jung Yeon Hwang, Dong Hoon Lee 0001 |
Non-interactive Identity-Based DNF Signature Scheme and Its Extensions. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
Signer Anonymity, Identity-Based Signature, Disjunctive Normal Form, Access Structure |
18 | Tuomas Aura, Janne Lindqvist, Michael Roe, Anish Mohammed |
Chattering Laptops. |
Privacy Enhancing Technologies |
2008 |
DBLP DOI BibTeX RDF |
network location awareness, Privacy, mobile computing, wireless networks, anonymity |
18 | Yijun He, Moon-Chuen Lee, Jie Li |
Enhanced Mutual Authentication and Key Exchange Protocol for Wireless Communications. |
APWeb |
2008 |
DBLP DOI BibTeX RDF |
MAKEP, Elliptic Curve, forward secrecy, user anonymity |
18 | Benjamin C. M. Fung, Ke Wang 0001, Philip S. Yu |
Anonymizing Classification Data for Privacy Preservation. |
IEEE Trans. Knowl. Data Eng. |
2007 |
DBLP DOI BibTeX RDF |
security, data mining, classification, integrity, anonymity, data sharing, Privacy protection |
18 | Przemyslaw Kubiak 0001, Miroslaw Kutylowski, Filip Zagórski |
Kleptographic attacks on a cascade of mix servers. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
cascade of mix servers, anonymity, electronic voting, kleptography |
18 | Traian Marius Truta, Alina Campan |
K-anonymization incremental maintenance and optimization techniques. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
clustering, optimization, privacy, k-anonymity, incremental |
18 | Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos |
PRIVE: anonymous location-based queries in distributed mobile systems. |
WWW |
2007 |
DBLP DOI BibTeX RDF |
dpatial databases, privacy, peer-to-peer, anonymity |
18 | Felipe Saint-Jean, Aaron Johnson 0001, Dan Boneh, Joan Feigenbaum |
Private web search. |
WPES |
2007 |
DBLP DOI BibTeX RDF |
PWS, privacy, anonymity, web search, tor, firefox |
18 | Gilles Brassard, Anne Broadbent, Joseph F. Fitzsimons, Sébastien Gambs, Alain Tapp |
Anonymous Quantum Communication. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
dining cryptographers, anonymity, multiparty computation, quantum cryptography |
18 | Sin-Hwa Kang |
The impact of digital iconic realism on anonymous interactants' mobile phone communication. |
CHI Extended Abstracts |
2007 |
DBLP DOI BibTeX RDF |
affective behavior, avatar realism, mobile phone communication, anonymity, social presence |
18 | Sriperumbuduru Kandala Simhalu, Keiji Takeda |
Browser Based Agile E-Voting System. |
ASIAN |
2007 |
DBLP DOI BibTeX RDF |
Individual Verifiability, Agile Voting, Anonymity, E-Voting |
18 | Reza Shokri, Maysam Yabandeh, Nasser Yazdani |
Anonymous Routing in MANET Using Random Identifiers. |
ICN |
2007 |
DBLP DOI BibTeX RDF |
Pseudonimity, Security, Privacy, MANET, Anonymity |
18 | Sherman S. M. Chow, Kim-Kwang Raymond Choo |
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
reveal query, anonymity, provable security, Key agreement, identity-based cryptography |
18 | Kazuto Ogawa, Goichiro Hanaoka, Kazukuni Kobara, Kanta Matsuura, Hideki Imai |
Anonymous Pay-TV System with Secure Revenue Sharing. |
KES (3) |
2007 |
DBLP DOI BibTeX RDF |
secure revenue sharing, anonymity, privacy preservation, homomorphic encryption, Pay-TV |
18 | Jeremy Clark, Paul C. van Oorschot, Carlisle Adams |
Usability of anonymous web browsing: an examination of Tor interfaces and deployability. |
SOUPS |
2007 |
DBLP DOI BibTeX RDF |
privoxy, privacy, anonymity, browsing, usable security, Tor, onion routing |
18 | Tassos Dimitriou, Ghassan Karame, Ioannis T. Christou |
SuperTrust: a secure and efficient framework for handling trust in super-peer networks. |
PODC |
2007 |
DBLP DOI BibTeX RDF |
security, privacy, trust, anonymity, P2P, super-peer |
18 | Miroslaw Kutylowski, Filip Zagórski |
Verifiable Internet Voting Solving Secure Platform Problem. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
vote selling, anonymity, electronic voting, coercion resistance |
18 | Dong Zheng 0001, Xiangxue Li, Kefei Chen, Jianhua Li |
Linkable Ring Signatures from Linear Feedback Shift Register. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
Characteristic sequence, Linkabilty, Anonymity, Linear feedback shift register, Ring signatures |
18 | Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Josep Maria Mateo-Sanz, Francesc Sebé |
Efficient multivariate data-oriented microaggregation. |
VLDB J. |
2006 |
DBLP DOI BibTeX RDF |
Privacy, Anonymity, Statistical disclosure control, Statistical databases, Microaggregation, Microdata protection |
18 | Lan Nguyen |
Privacy-Protecting Coupon System Revisited. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
anonymity and privacy, transaction, coupon |
18 | Lukasz Krzywiecki, Przemyslaw Kubiak 0001, Miroslaw Kutylowski |
A Revocation Scheme Preserving Privacy. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
key broadcasting, exclusion protocol, anonymity |
18 | Regine Endsuleit, Thilo Mie |
Censorship-Resistant and Anonymous P2P Filesharing. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
Censorship Resistance, Anonymity, Encryption, Peer-to-Peer Systems, Structured Overlay Networks |
18 | Xiaokui Xiao, Yufei Tao 0001 |
Personalized privacy preservation. |
SIGMOD Conference |
2006 |
DBLP DOI BibTeX RDF |
privacy preservation, k-anonymity |
18 | Zhengjun Cao |
Analysis of One Popular Group Signature Scheme. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
exculpability, anonymity, group signature |
18 | Karen P. Tang, Pedram Keyani, James Fogarty, Jason I. Hong |
Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. |
CHI |
2006 |
DBLP DOI BibTeX RDF |
hitchhiking, privacy, anonymity, location-based computing |
18 | Ronghui Wu, Renfa Li, Fei Yu 0001, Guangxue Yue, Cheng Xu 0001 |
Research on User Authentication for Grid Computing Security. |
SKG |
2006 |
DBLP DOI BibTeX RDF |
grid computing security, Access control, anonymity, Authentication protocol |
18 | Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen |
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Anonymity, Revocable, Ring Signature, Linkable |
18 | Lan Nguyen |
Efficient Dynamic k-Times Anonymous Authentication. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
dynamic k-times anonymous authentication, k-show anonymous credentials, e-tag, privacy, anonymity |
18 | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo |
Optimized Initiation Phases for Anonymous Auction Protocols. |
Human.Society@Internet |
2005 |
DBLP DOI BibTeX RDF |
Auction protocol, Initiation protocol, Security, Anonymity, Efficiency |
18 | Hyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 |
Oblivious Conjunctive Keyword Search. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
Privacy, Anonymity, Storage system, Oblivious Transfer, Conjunctive Keyword Search |
18 | Jiejun Kong, Dapeng Wu 0001, Xiaoyan Hong, Mario Gerla |
Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes. |
SASN |
2005 |
DBLP DOI BibTeX RDF |
ANODR, identity-free routing, motion-MIX, mobility, anonymity |
18 | Lan Nguyen |
Accumulators from Bilinear Pairings and Applications. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
membership revocation, privacy, anonymity, group signatures, ring signatures, ID-based, identity escrow, Dynamic accumulators |
18 | Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger |
Anonymous Payment in a Fair E-Commerce Protocol with Verifiable TTP. |
TrustBus |
2005 |
DBLP DOI BibTeX RDF |
Electronic coins, Anonymity, Atomicity, Fair exchange, Verifiability |
18 | Li Xiao 0001, Xiaodong Zhang 0001, Artur Andrzejak 0001, Songqing Chen |
Building a Large and Efficient Hybrid Peer-to-Peer Internet Caching System. |
IEEE Trans. Knowl. Data Eng. |
2004 |
DBLP DOI BibTeX RDF |
browser caching, communication anonymity, data integrity, peer-to-peer systems, proxy caching, Internet systems |
18 | Shouhuai Xu, Moti Yung |
k-anonymous secret handshakes with reusable credentials. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
privacy-preserving authentication, reusable credentials, anonymity, unlinkability, secret handshake, credential systems |
18 | Song Han 0004, Jie Wang 0038, Wanquan Liu |
An Efficient Identity-Based Group Signature Scheme over Elliptic Curves. |
ECUMN |
2004 |
DBLP DOI BibTeX RDF |
Network Security, Anonymity, Security Protocol, Group Signatures, Weil Pairings |
Displaying result #501 - #600 of 3902 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|